Salta al contenuto principale



La cyber-formazione esclude il 70% delle persone


Il 70% della popolazione ha un cervello asimmetrico. Solo il 30% possiede quella configurazione cognitiva bilanciata che i manuali di formazione considerano standard. Eppure continuiamo a progettare corsi di security awareness, procedure operative e processi di sicurezza come se tutti ragionassero allo stesso modo.

Il risultato? Un fallimento sistematico che è certificato dai tanti report annuali sull’incidenza degli attacchi (in Italia e nel mondo). Non perché le persone siano stupide o disattente, ma perché stiamo addestrando cervelli che non esistono.

Il mito dell’utente medio


Le aziende spendono milioni in tecnologie di difesa, firewall sofisticati, sistemi di rilevamento delle intrusioni. Poi il ransomware entra dopo un click su un’email di phishing. Come sempre, l’anello debole è additato con vari nomignoli: “utonto”, Layer 8, “ID-10T” (idiota).

Ma il vero problema non è il fattore umano. Il problema è trattare le persone come variabili da standardizzare invece che come ecosistemi cognitivi da comprendere.

Un dipendente con ADHD non fallisce il test di phishing perché è distratto: fallisce perché la sua attenzione funziona diversamente e nessuno ha progettato contenuti adatti al suo cervello. Una persona autistica non ignora le procedure perché è rigida: le ignora perché sono scritte in modo ambiguo e il suo cervello richiede coerenza logica assoluta. Un dislessico non legge male le policy: il suo cervello privilegia informazioni visive e nessuno gliele fornisce.

Almeno il 15-20% dei dipendenti in ogni organizzazione ha qualche forma di neurodivergenza (il 70% secondo lo studio di Greenberg, Warrier, Allison e Baron-Cohen) E la formazione standard li perde sistematicamente.

La catena dell’infezione democratica


Lo stesso malware che ieri bloccava i server di una banca oggi cripta le foto della signora Pina sul suo PC di casa. Come? Con un messaggio WhatsApp dal nipote, la cui moglie lavora in quella banca e che ha preso il virus sul PC aziendale che si è diffuso automaticamente nella rete di casa. E viceversa.

La cybersecurity è profondamente democratica: le minacce non fanno distinzioni tra multinazionali e casalinghe, tra esperti e principianti. Colpiscono l’anello più debole della catena, che quasi sempre è una persona che viene colta in un momento di vulnerabilità cognitiva.

Un attimo di distrazione, un messaggio che arriva nel momento sbagliato, una richiesta urgente che bypassa ogni difesa razionale. E un link che sembra legittimo perché usa esattamente le parole giuste per il tuo profilo cognitivo.

I criminali lo sanno. Usano social engineering, messaggi di urgenza, false autorità, pressione emotiva. E funziona su tutti: dal CEO al parente che non sa distinguere tra un link buono e uno cattivo.

Il gap italiano


L’Italia è agli ultimi posti tra i Paesi UE per competenze digitali di base: solo il 45% degli italiani le possiede secondo l’indice DESI 2025 della Commissione Europea. Un gap che rallenta la diffusione di una cultura della sicurezza che dovrebbe essere educazione civile, come quella stradale o sessuale.

Ma il problema non è solo l’alfabetizzazione digitale. È l’approccio cognitivo. Continuiamo a erogare formazione come se tutti processassero le informazioni allo stesso modo, come se tutti avessero gli stessi punti deboli, come se una soluzione unica potesse proteggere configurazioni mentali diverse.

Le aziende più avanzate lo hanno capito e stanno investendo in programmi di security awareness che coinvolgono non solo i dipendenti, ma anche le loro famiglie. Perché hanno compreso che la sicurezza non si ferma al perimetro aziendale: viaggia attraverso le connessioni umane, i dispositivi e le reti personali, le abitudini domestiche.

Verso una difesa cognitivamente inclusiva


La soluzione non è fare più formazione. È fare formazione diversa. Progettata per cervelli reali, non per l’utente medio che non esiste.

Significa profilare cognitivamente le persone: capire come processano informazioni, quali sono le loro vulnerabilità specifiche, quali leve cognitive funzionano su di loro. Non per manipolarle, ma per proteggerle efficacemente.

Significa usare formati diversi per configurazioni cognitive diverse: video brevi per ADHD, procedure dettagliate e logiche per autistici, infografiche e mappe visive per dislessici. Non un corso unico per tutti, ma percorsi adattivi.

Significa applicare il principio “zero trust” anche alle persone: non fidarsi delle buone intenzioni, verificare costantemente i comportamenti, rimediare rapidamente quando qualcuno devia dal protocollo.

Significa trattare la vulnerabilità umana come si tratta la vulnerabilità tecnologica: assessment continuo, prioritizzazione del rischio, patching comportamentale, monitoraggio degli indicatori.

Il fattore umano come risorsa


La cybersecurity deve spostarsi da silos tecnologici isolati a una visione integrata che consideri come il comportamento umano dentro e fuori dall’ufficio influisca direttamente sulla protezione aziendale.

E deve smettere di vedere la diversità cognitiva come problema. Un team con membri neurodivergenti vede vulnerabilità che un team omogeneo ignora. Ma solo se i processi sono progettati per usare il cervello che hanno, non per forzarli ad adattarsi a un modello che non gli appartiene.

La domanda non è più “come addestriamo meglio le persone?”. La domanda è “come progettiamo sistemi di difesa che funzionano su cervelli reali?”.

Se vuoi approfondire come trasformare il fattore umano da vulnerabilità a risorsa attraverso modelli di security awareness cognitivamente inclusivi, il libroCYBERCOGNITIVISMO 2.0 – Manipolazione, Persuasione e Difesa Digitale(in arrivo su Amazon) propone framework operativi per gestire la vulnerabilità cognitiva come si gestisce il rischio tecnologico: con assessment, profiling, remediation e monitoraggio continuo.

L'articolo La cyber-formazione esclude il 70% delle persone proviene da Red Hot Cyber.



Hidden Camera Build Proves You Can’t Trust Walnuts


Typically, if you happened across a walnut lying about, you might consider eating it or throwing it to a friendly squirrel. However, as [Penguin DIY] demonstrates, it’s perfectly possible to turn the humble nut into a clandestine surveillance device. It turns out the walnut worriers were right all along.

The build starts by splitting and hollowing out the walnut. From there, small holes are machined into the mating faces of the walnut, into which [Penguin DIY] glues small neodymium magnets. These allow the walnut to be opened and snapped shut as desired, while remaining indistinguishable from a regular walnut at a distance.

The walnut shell is loaded with nine tiny lithium-polymer cells, for a total of 270 mAh of battery capacity at 3.7 volts. Charging the cells is achieved via a deadbugged TP4056 charge module to save space, with power supplied via a USB C port. Holes are machined in the walnut shell for the USB C port as well as the camera lens, though one imagines the former could have been hidden purely inside for a stealthier look. The camera itself appears to be an all-in-one module with a transmitter built in, with the antenna installed in the top half of the walnut shell and connected via pogo pins. The video signal can be picked up at a distance via a receiver hooked up to a smart phone. No word on longevity, but the included batteries would probably provide an hour or two of transmission over short ranges if you’re lucky.

If you have a walnut tree in your backyard, please do not email us about your conspiracy theories that they are watching you. We get those more than you might think, and they are always upsetting to read. If, however, you’re interested in surveillance devices, we’ve featured projects built for detecting them before with varying levels of success. Video after the break.

youtube.com/embed/j0rs7ny2t8A?…


hackaday.com/2025/12/12/hidden…

Gazzetta del Cadavere reshared this.



IL RITORNO DEL TERMICO: Perché l'Elettrico ha perso la scommessa (Analisi Ingegneristica)


youtu.be/Dkh3fLianiE?si=QBpWJ9…


Esce Kali Linux 2025.4! Miglioramenti e Novità nella Distribuzione per la Sicurezza Informatica


La recente edizione 2025.4 di Kali Linux è stata messa a disposizione del pubblico, introducendo significative migliorie per quanto riguarda gli ambienti desktop GNOME, KDE e Xfce. D’ora in poi, Wayland sarà il sistema di gestione delle finestre utilizzato di default, rappresentando un’importante novità rispetto alle precedenti versioni.

L’aggiornamento più recente trae spunto dalla versione precedente 2025.3 di settembre e vanta esperienze desktop perfezionate, un supporto guest VM potenziato in Wayland nonché una gamma di nuovi strumenti per la sicurezza offensiva.

Aggiornamenti dell’ambiente desktop


È importante sottolineare che GNOME ha abbandonato completamente il supporto per X11, spingendo Kali ad adottare Wayland come unico server Windows. Gli sviluppatori di Kali descrivono il passaggio come un’operazione fluida, grazie a test approfonditi e configurazioni aggiuntive per gli ambienti di macchine virtuali.

Tutti e tre gli ambienti desktop supportati, GNOME, KDE Plasma e Xfce, hanno ricevuto notevole attenzione. GNOME 49 introduce un’interfaccia più coerente e reattiva. Tra le modifiche più significative, una nuova categorizzazione degli strumenti nella griglia delle app, allineata alla tradizionale struttura del menu di Kali. Il lettore video Totem è stato sostituito con l’app più leggera Showtime e le scorciatoie da tastiera a lungo richieste per l’avvio dei terminali (Ctrl+Alt+T / Win+T) sono ora attive su tutti i desktop GNOME.

In Xfce, che rimane il desktop predefinito di Kali, è stato aggiunto un nuovo sistema di gestione dei colori, che finalmente raggiunge la parità con la personalizzazione visiva di GNOME e KDE. Gli utenti possono ora modificare i temi delle icone, i colori GTK/Qt e le decorazioni delle finestre tramite lo strumento Aspetto di Xfce e le utilità qt5ct / qt6ct.

Nuovi strumenti


Sono stati introdotti tre nuovi strumenti nei repository di Kali:

  1. bpf-linker – Un semplice linker statico per programmi BPF (Berkeley Packet Filter).
  2. evil-winrm-py – Una riscrittura in Python di Evil-WinRM, che consente l’esecuzione di comandi su macchine Windows remote tramite WinRM.
  3. hexstrike-ai – Un server MCP che facilita l’esecuzione autonoma di strumenti da parte di agenti di intelligenza artificiale.

Oltre agli aggiornamenti della toolchain, Kali Linux ha aggiornato il suo kernel alla versione 6.16, garantendo la compatibilità con nuovi hardware e funzionalità.

Supporto guest Wayland e VM completamente funzionante


Kali 2025.4 segna una pietra miliare nella transizione a Wayland, che ha sostituito X11 in tutta la distribuzione. Mentre GNOME ora impone ufficialmente sessioni esclusivamente basate su Wayland, Kali distribuiva Wayland di default per KDE già dalla versione 2023.1.

Uno dei principali ostacoli a un’adozione più ampia di Wayland è stato il supporto incompleto per le utilità guest delle VM, in particolare la condivisione degli appunti e il ridimensionamento dinamico delle finestre. Gli sviluppatori di Kali segnalano di aver risolto questi problemi in questa versione. Le installazioni virtualizzate di Kali su VirtualBox, VMware e QEMU offrono ora il supporto completo per l’aggiunta di VM guest su Wayland, allineandosi all’esperienza X11.

Altri aggiornamenti


La piattaforma NetHunter per Android ha ricevuto diversi aggiornamenti, tra cui il supporto anticipato ad Android 16 per le varianti Samsung Galaxy S10, OnePlus Nord e dispositivi Xiaomi Mi 9. Il terminale NetHunter è ora di nuovo funzionante, con supporto per la modalità interattiva Magisk, che garantisce una migliore stabilità della sessione.

Lo strumento di phishing Wifipumpkin3 è stato aggiornato con nuovi modelli per piattaforme comuni come Instagram, iCloud e Snapchat, ed è in fase di sperimentazione un nuovo terminale in-app (versione alpha).

Chi fosse interessato a provare Kali Linux 2025.4 può scaricarlo da qui . A causa delle limitazioni di Cloudflare CDN sulle dimensioni dei file (~5 GB) e del costante aumento del peso e della complessità dei pacchetti, l’immagine Live ISO è ora disponibile solo tramite BitTorrent.

L'articolo Esce Kali Linux 2025.4! Miglioramenti e Novità nella Distribuzione per la Sicurezza Informatica proviene da Red Hot Cyber.



Attacco informatico ai server del Ministero dell’Interno Francese


I server di posta elettronica del Ministero dell’Interno in Francia sono stati presi di mira da un attacco informatico. L’hacker è riuscito ad accedere a “diversi file”, ma al momento non è stata rilevata alcuna “grave compromissione”.

La notizia, rivelata da BFMTV , è stata confermata dal Ministro dell’Interno Laurent Nuñez alla radio RTL.

C’è stato un attacco informatico“, ha affermato. “Un aggressore è riuscito ad accedere a diversi file “. La natura e il numero dei file coinvolti non sono ancora noti, secondo Laurent Nuñez, che ha specificato di non avere “tracce di compromissione grave” in questa fase.

Sono state implementate procedure di sicurezza standard e il livello di sicurezza è stato rafforzato, in particolare per quanto riguarda l’accesso al sistema informativo per tutti i dipendenti pubblici, che è stato rafforzato. Ciò include l’introduzione di un’analisi proattiva dei server e delle caselle di posta elettronica e l’implementazione sistematica dell’autenticazione a due fattori, secondo il Ministero dell’Interno.

Parallelamente, è stata presentata una segnalazione al procuratore generale Laure Beccuau. È in corso un’indagine giudiziaria.

Al momento non si prospetta alcuna ipotesi. “Esistono diverse motivazioni per un attacco informatico: a volte può trattarsi di interferenze straniere, di persone che vogliono sfidare le autorità pubbliche per dimostrare di essere in grado di accedere ai sistemi, e di reati informatici. Per ora, non sappiamo di cosa si tratti “, ha spiegato il ministro.

Alla domanda sulla possibilità di una violazione dei dati su larga scala, Laurent Nuñez ha assicurato che ” è stato predisposto tutto per impedirlo ” e per ” rafforzare immediatamente il sistema “.

L'articolo Attacco informatico ai server del Ministero dell’Interno Francese proviene da Red Hot Cyber.

Gazzetta del Cadavere reshared this.



#Ucraina: l'Europa in trappola


altrenotizie.org/primo-piano/1…



L’informazione, di per sé, non significa nulla se non viene inserita nel proprio contesto. Un dato isolato può sembrare impressionante, ma spesso è fuorviante. Una citazione estratta dal suo discorso originale può assumere un significato che non le appartiene. Il blogger deve evitare che il suo contenuto diventi una tessera di un puzzle incompleto. La contestualizzazione è un atto di chiarezza che restituisce al lettore la complessità del mondo, senza semplificarlo in modo irresponsabile.


Rats Get even Better at Playing DOOM


rat playing doom

We all know that you can play DOOM on nearly anything, but what about the lesser known work being done to let other species get in on the action? For ages now, our rodent friends haven’t been able to play the 1993 masterpiece, but [Viktor Tóth] and colleagues have been working hard to fix this unfortunate oversight.

If you’ve got the feeling this isn’t the first time you’ve read about rats attempting to slay demons, it’s probably because [Victor] has been working on this mission for years now — with a previous attempt succeeding in allowing rats to navigate the DOOM landscape. Getting the rodents to actually play through the game properly has proved slightly more difficult, however.

Diagram of screen in front of rat playing doom

Improving on the previous attempt, V2 has the capability to allow rats to traverse through levels, be immersed in the virtual world with a panoramic screen, and take out enemies. Rewards are given to successful behaviors in the form of sugar water through a solenoid powered dispenser.

While this current system looks promising, the rats haven’t gotten too far though the game due to time constraints. But they’ve managed to travel through the levels and shoot, which is still pretty impressive for rodents.

DOOM has been an indicator of just how far we can take technology for decades. While this particular project has taken the meme into a slightly different direction, there are always surprises. You can even play DOOM in KiCad when you’re tired of using it to design PCBs.


hackaday.com/2025/12/12/rats-g…



“La possibilità di far risuonare, attraverso la bellezza, una scintilla della presenza di Dio”. Papa Leone XIV lo ha detto nel discorso ai partecipanti al Concerto di Natale diretto dal maestro Riccardo Muti, che si è svolto oggi nell’aula Paolo VI i…



linkiesta.it/2025/12/piano-tru…

"È proprio perché vuole la pace che Kyjiv non può accettare le condizioni imposte dai russi (al chiaro scopo di riprendere la guerra),"

non avrei saputo dirlo meglio.


"Dunque, per tradurre la discussione in termini più comprensibili, dovremmo dire che la proposta di pace russa è questa: noi smettiamo di assediarvi e tentare di entrare dentro casa vostra, a condizione che da domani voi lasciate la porta aperta, anzi la porta la dovete proprio togliere dai cardini, in cambio della nostra parola di gentiluomini che non ne approfitteremo in alcun modo. Se a questo aggiungiamo pure le richieste sul ridimensionamento dell’esercito e degli armamenti ucraini, il gioco dovrebbe essere piuttosto chiaro a chiunque non sia completamente scemo."



Spazio, Leonardo ambisce al mercato dei lanciatori? Ecco cosa lo fa pensare

@Notizie dall'Italia e dal mondo

Se l’Europa politica stenta ancora a dare segnali concreti di unità, l’industria, dal canto suo, sembra avere le idee chiare sul futuro. Anche più di quanto non racconti apertamente, almeno finora. Dal palco di Atreju, Roberto Cingolani ha rivelato ulteriori dettagli su



la domanda è: hai la coerenza di chiedere a qualcuno un sacrifico che tu saresti disposto a fare? un uomo è questo e poco altro in definitiva... se esiste un dio anche solo basicamente giusto, con etica minimale, poco altro ha importanza oltre a questo... roba da farsi cacciare pure dall'inferno per intenderci...


This week, we discuss conversational AI, a behind the scenes of the zine, and more.#BehindTheBlog


Behind the Blog: Is This Headline 'Clickbait'?


This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss conversational AI, a behind the scenes of the zine, and more.

EMANUEL: I made the terrible mistake of looking at some Hacker News comments this week for my story about a developer whose Google accounts were banned after he uploaded training data to Google Drive. Unbeknownst to him, the training data contained CSAM.

As we’ve explained in previous stories, CSAM is a subject we dread covering not only because it’s one of the most awful things one could think about, but because it’s extremely difficult and legally risky. For understandable reasons, the laws around viewing, let alone possessing CSAM, are strict and punishing, which makes verification for reporting reasons challenging. For similar reasons, it’s something we need to write about very carefully, making sure we don’t wrongfully associate or whitewash someone when it comes to such horrible behavior.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




“Passare da qui e incontrare l’immagine pacifica di Francesco, un uomo che ancora oggi ci invita a sentirci fratelli, a condividere le sofferenze degli altri e a costruire percorsi di autentica amicizia, è un messaggio di straordinaria grandezza che …



a titolo di indagine, per farsi un'idea, trump potrebbe intanto chiedere a tutti i cittadini usa del texas se per evitare una guerra con la russia sono disposti ad andare a vivere in un altro stato (a spese proprie) e consegnare le chiavi di casa propria a putin... chissà cosa risponderanno.


""Pensavo fossimo molto vicini ad un accordo con la Russia e pensavo fossimo vicini ad un accordo con l'Ucraina. Al di là del presidente Zelensky, la sua gente apprezza l'idea dell'accordo"

trump non sa neppure cosa pensa la parte politica non propria negli stati uniti (e pure su quella ci sarebbe da discutere) e non rappresenta tutti i cittadini usa. figurarsi se può sapere meglio di zelensky cosa pensano gli ucraini. è improbabile. al massimo saprà cosa pensa quell'1 su 100'000 che per legge dei grandi numeri sono già fascistoni...



Dati, reti e deterrenza. Cosa emerge dall’esercitazione Cyber eagle

@Notizie dall'Italia e dal mondo

Si è chiusa una delle principali esercitazioni italiane dedicate alla difesa digitale, un appuntamento che restituisce una fotografia concreta di come il dominio cibernetico sia ormai parte integrante della sicurezza nazionale. L’Aeronautica militare ha presentato i risultati di



BOLIVIA. Arrestato l’ex presidente Luis Arce, timori per Evo Morales


@Notizie dall'Italia e dal mondo
In Bolivia la procura ha arrestato l'ex presidente di centrosinistra Luis Arce per malversazione di fondi pubblici. I sostenitori di Evo Morales temono che il prossimo ad essere arrestato sia l'ex leader del Movimento al Socialismo
L'articolo BOLIVIA. Arrestato l’ex




#ScuolaFutura, dal 12 al 15 dicembre, il campus itinerante sull’innovazione didattica promosso dal #MIM farà tappa a #Sanremo con i laboratori nazionali di orientamento dedicati alla musica e alle #STEM.

Science Channel reshared this.



Componenti cinesi nelle auto americane? L’allarme del Congresso per la sicurezza nazionale

@Notizie dall'Italia e dal mondo

La catena globale della produzione automobilistica è ormai diventata un fronte della competizione strategica tra Stati Uniti e Cina. E il messaggio è emerso con chiarezza durante un’audizione della House Select Committee on China, in cui i vertici della



Dal gas russo al Green Deal, passando per il riarmo: i nodi politici della plenaria di dicembre

Per vedere altri post sull' #IntelligenzaArtificiale, segui la comunità @Intelligenza Artificiale

La plenaria del Parlamento europeo che si terrà dal 16 al 18 dicembre si conferma come il passaggio istituzionale più rilevante dell’anno

reshared this



FinTech und Datenschutz: PayPal sammelt die sexuellen Vorlieben von Kunden


netzpolitik.org/2025/fintech-u…

Boerps ☑️ reshared this.



I conti volano ma Xiaomi tira giù le serrande dei suoi negozi

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

Come molte Big Tech americane, pure la cinese Xiaomi razionalizza i costi nonostante abbia conti in costante crescita. A farne le spese oltrehttps://www.startmag.it/innovazione/i-conti-volano-ma-xiaomi-tira-giu-le-serrande-dei-suoi-negozi/

reshared this



56 anni fa, la strage di piazza Fontana a Milano. Strage fascista, dove morirono 17 persone e ne vennero ferite 88. Lo stato accusò gli anarchici, arrestarono il ferroviere Giuseppe Pinelli, che guarda caso morì cadendo dalla finestra della questura di Milano. Dissero che si era buttato... Una preghiera per le vittime della stage e per Pinelli, vittima innocente di un omicidio di stato.

La storia della strage di Piazza Fontana: perché cambiò l’Italia
geopop.it/strage-di-piazza-fon…




Ecco come Trump vieta agli Stati Usa di legiferare sull’IA

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

Nonostante gli Stati Usa stiano agendo in ordine sparso per regolamentare l'IA, Trump ha stabilito che solo il governo può decidere a livello federale, privando quindi i singoli Stati del loro potere di legiferare in materia. Fatti e critiche

reshared this




VERSO LA SEMPLIFICAZIONE DI PRIVACY, CYBERSECURITY E INTELLIGENZA ARTIFICIALE

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

Se a breve va in porto il cosiddetto “Omnibus Digitale”, smetteranno di lamentarsi tutti quelli che negli ultimi trent’anni non hanno digerito gli adempimenti in materia di riservatezza dei dati e più

reshared this




BENIN. Il golpe sventato grazie all’intervento della Francia e dell’Ecowas


@Notizie dall'Italia e dal mondo
Per sventare il tentato golpe in Benin sono intervenute le truppe dell'Ecowas, un'alleanza regionale fedele a Parigi. La Francia non vuole perdere la sua residua influenza in Africa dopo l'avvicinamento a Mosca di Burkina Faso, Mali e Niger
L'articolo BENIN. Il golpe sventato grazie



OSINT nell'Indagine sull'assalto al Campidoglio degli Stati Uniti


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/osint-ca…
Dopo il grande pezzo sugli ecoceronti, Claudia torna a noi per regalarci una nuova perla dedicata all'OSINT. Non è roba da nerd, anzi, è qualcosa che ci appartiene culturalmente e che abbiamo imparato fin dai tempi dell'asilo.

Privacy Pride reshared this.



Sara Gioielli – Gioielli neri
freezonemagazine.com/articoli/…
Quando il talento incontra lo studio e la passione, allora nascono percorsi artistici dall’alto potenziale di sviluppo. Questo è il caso di Sara Gioielli, pianista e diplomata in canto jazz in quel Sancta Sanctorum che è il conservatorio di San Pietro a Majella di Napoli, straordinaria fucina di artisti e compositori fin dalla sua fondazione […]
L'articolo Sara Gioielli – Gioielli neri proviene da


STATI UNITI. L’ICE perseguita i lavoratori. Datori di lavoro e sindacati reagiscono


@Notizie dall'Italia e dal mondo
Quali sono le tattiche che aziende agricole, fabbriche, ristoranti e altri luoghi di lavoro utilizzano per proteggere i dipendenti immigrati dalle incursioni dell'ICE?
L'articolo STATI UNITI. L’ICE perseguita i lavoratori. Datori di lavoro e




Ieri, al #MIM, con l’accensione dell’albero di #Natale, alla presenza del Ministro Giuseppe Valditara e del Sottosegretario Paola Frassinetti, si sono conclusi i laboratori di #NextGenArt.


Non solo Starlink, American Airlines punta ad Amazon Leo per il Wi-Fi a bordo

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

Se la rivale Starlink ha già accordi con diverse compagnie aeree per fornire servizi Internet in volo, anche Amazon Leo potrebbe mettere a segno il primo accordo con il vettore American Airlines. Tutti i

reshared this



Digital Fights: Digital Lights: Wir kämpfen gegen Handydurchsuchungen bei Geflüchteten


netzpolitik.org/2025/digital-f…



Ma com'è sta storia che il petrolio scende di prezzo e i carburanti aumentano? 🤨🧐😠

Il petrolio chiude in calo a New York a 57,60 dollari al barile - Ultima ora - Ansa.it
ansa.it/sito/notizie/topnews/2…



Ma com'è sta storia che il petrolio scende di prezzo e i carburanti aumentano? 🤨🧐😠



Journalists warn of silenced sources


From national outlets to college newspapers, reporters are running into the same troubling trend: sources who are afraid to speak to journalists because they worry about retaliation from the federal government.

This fear, and how journalists can respond to it, was the focus of a recent panel discussion hosted by Freedom of the Press Foundation (FPF), the Association of Health Care Journalists, and the Society of Environmental Journalists. Reporters from a range of beats described how the second Trump administration has changed the way people talk to the press, and what journalists do to reassure sources and keep them safe.

youtube.com/embed/rIyRDQFEl4k?…

For journalist Grace Hussain, a solutions correspondent at Sentient Media, this shift became unmistakable when sources who relied on federal funding suddenly backed out of participating in her reporting. “Their concerns were very legitimate,” Hussain said, “It was possible that their funding could get retracted or withdrawn” for speaking to the press.

When Hussain reached out to other reporters, she found that sources’ reluctance to speak to the press for fear of federal retaliation is an increasingly widespread issue that’s already harming news coverage. “There are a lot of stories that are under-covered, and it’s just getting more difficult at this point to do that sort of coverage with the climate that we’re in,” she said.

Lizzy Lawrence, who covers the Food and Drug Administration for Stat, has seen a different but equally unsettling pattern. Lawrence has found that more government sources want to talk about what’s happening in their agencies, but often only if they’re not named. Since Trump returned to office, she said, many sources “would request only to speak on the condition of anonymity, because of fears of being fired.” As a result, her newsroom is relying more on confidential sources, with strict guardrails, like requiring multiple sources to corroborate information.

For ProPublica reporter Sharon Lerner, who’s covered health and the environment across multiple administrations, the heightened fear is impossible to miss. Some longtime sources have cut off communication with her, including one who told her they were falsely suspected of leaking.

And yet, she added, speaking to the press may be one of the last options left for employees trying to expose wrongdoing. “So many of the avenues for federal employees to seek justice or address retaliation have been shut down,” Lerner said.

This chilling effect extends beyond federal agencies. Emily Spatz, editor-in-chief of Northeastern’s independent student newspaper The Huntington News, described how fear spread among international students after federal agents detained Mahmoud Kahlil and Rümeysa Öztürk. Visa revocations of students at Northeastern only deepened the concern.

Students started asking the newspaper to take down previously published op-eds they worried could put them at risk, a step Spatz took after careful consideration. The newsroom ultimately removed six op-eds but posted a public website documenting each removal to preserve transparency.

Even as the paper worked hard to protect sources, many became reluctant to participate in their reporting. One student, for instance, insisted the newspaper remove a photo showing the back of their head, a method the paper had used specifically to avoid identifying sources.

Harlo Holmes, the chief information security officer and director of digital security at FPF, said these patterns mirror what journalists usually experience under authoritarian regimes, but — until now — have not been seen in the United States. Whistleblowing is a “humongously heroic act,” Holmes said, “and it is not always without its repercussions.”

She urged reporters to adopt rigorous threat-modeling practices and to be transparent with sources about the tools and techniques they use to keep them safe. Whether using SecureDrop, Signal, or other encrypted channels, she said journalists should make it easy for sources to find out how to contact them securely. “A little bit of education goes a long way,” she said.

For more on how journalists are working harder than ever to protect vulnerable sources, watch the full event recording here.


freedom.press/issues/journalis…



Covering immigration in a climate of fear


As the federal government ramps up immigration enforcement, sweeping through cities, detaining citizens and noncitizens, separating families, and carrying out deportations, journalists covering immigration have had to step up their work, too.

Journalists on the immigration beat today are tasked with everything from uncovering government falsehoods to figuring out what their communities need to know and protecting their sources. Recently, Freedom of the Press Foundation (FPF) hosted a conversation with journalists Maritza Félix, the founder and director of Conecta Arizona; Arelis Hernández, a reporter for The Washington Post; and Lam Thuy Vo, an investigative reporter with Documented. They discussed the challenges they face and shared how they report on immigration with humanity and accuracy, while keeping their sources and themselves safe.

youtube.com/embed/OPPo0YzKfnA?…

Immigration reporting has grown a lot more difficult, explained Hernández, as sources increasingly fear retaliation from the government. “I spend a lot of time at the front end explaining, ‘Where will this go? What will it look like?’” Hernández said, describing her process of working with sources to ensure they participate in reporting knowingly and safely. She also outlined her own precautions, from using encrypted devices to carrying protective gear, highlighting just how unsafe conditions have become, even for U.S.-born reporters.

Like Hernández, Félix also emphasized the intense fear and uncertainty many immigrant sources experience. Other sources, however, may be unaware of the possible consequences of speaking to reporters and need to be protected as well. “I think when we’re talking about sources, particularly with immigration, we’re talking about people who are sharing their most vulnerable moments in their life, and I think the way that we treat it is going to be very decisive on their future,” she said.

Journalists who are themselves immigrants must also manage personal risk, Félix said, “but the risk is always going to be there just because of who we are and what we represent in this country.” She pointed to the arrest and deportation of journalist Mario Guevara in Georgia, saying it “made me think that could have been me” before she became a U.S. citizen. She recommended that newsrooms provide security training, mental health resources, and operational protocols for both staff and freelancers.

Both Félix and Vo, who work in newsrooms by and for immigrant communities, emphasized the need for journalists to actively listen to the people they cover. “If you’re trying to serve immigrants, build a listening mechanism, some kind of way of continuing to listen to both leaders in the community, service providers, but also community members,” Vo advised. She also recommended that journalists use risk assessments and threat modeling to plan how to protect themselves and their sources.

Watch the full discussion here.


freedom.press/issues/covering-…



Tempesta e freddo su 850mila sfollati vittime dello stato genocida di israele.
Rahaf, bimba di otto mesi, morta di freddo a Kahn Younis
differx.noblogs.org/2025/12/11…

#Gaza #genocidio #israhell #tempesta #tempestabyron

reshared this





‘Architects of AI’ Wins Time Person of the Year, Sends Gambling Markets Into a Meltdown#TimePersonoftheYear


‘Architects of AI’ Wins Time Person of the Year, Sends Gambling Markets Into a Meltdown


The degenerate gamblers of Polymarket and Kalshi who bet that “AI” would win the Time Person of the Year are upset because the magazine has named the “Architects of AI” the person of the year. The people who make AI tools and AI infrastructure are, notably, not “AI” themselves, and thus both Kalshi and Polymarket have decided that people who bet “AI” do not win the bet. On Polymarket alone, people spent more than $6 million betting on AI gracing the cover of Time.

As writer Parker Molloy pointed out, people who bet on AI are pissed. “ITS THE ARCHITECTS OF AI THISNIS [sic] LITERALLY THE BET FUCK KALSHI,” one Kalshi better said.

“This pretty clearly should’ve resolved to yes. If you bought AI, reach out to Kalshi support because ‘AI’ is literally on the cover and in the title ‘Architects of AI.’ They’re not going to change anything unless they hear from people,” said another.

“ThE aRcHiTeCtS oF AI fuck you pay me,” said a third.

“Another misleading bet by Kalshi,” said another gambler. “Polymarket had fair rules and Kalshi did not. They need to fix this.”

But bag holders on Polymarket are also pissed. “This is a scam. It should be resolved to a cancellation and a full refund to everyone,” said a gambler who’d put money down on Jensen Huang and lost. Notably, on Kalshi, anyone who bet on any of the “Architects of AI,” won the bet (meaning Sam Altman, Elon Musk, Jensen Huang, Dario Amodei, Mark Zuckerberg, Lisa Su, and Demis Hassabis), while anyone who bet their products—“ChatGPT” and “OpenAI” did not win. On Polymarket, the rules were even more strict, i.e. people who bet “Jensen Huang” lost but people who bet “Other” won.

“FUCK YOU FUCKING FUCK Shayne Coplan [CEO of Polymarket],” said someone who lost about $50 betting on AI to make the cover.

Polymarket made its reasoning clear in a note of “additional context” on the market.

“This market is about the person/thing named as TIME's Person of the Year for 2025, not what is depicted on the cover. Per the rules, “If the Person of the Year is ‘Donald Trump and the MAGA movement,’ this would qualify to resolve this market to ‘Trump.’ However if the Person of the Year is ‘The MAGA movement,’ this would not qualify to resolve this market to ‘Trump’ regardless of whether Trump is depicted on the cover,” it said.

“Accordingly, a Time cover which lists ‘Architects of AI’ as the person of the year will not qualify for ‘AI’ even if the letters ‘AI’ are depicted on the cover, as AI itself is not specifically named.”

It should be noted how incredibly stupid all of this is, which is perhaps appropriate for the year 2025, in which most of the economy consists of reckless gambling on AI. People spent more than $55 million betting on the Time Person of the Year on Polymarket, and more than $19 million betting on the Time Person of the Year on Kalshi. It also presents one of the many downsides of spending money to bet on random things that happen in the world. One of the most common and dumbest things that people continue to do to this day despite much urging otherwise is anthropomorphize AI, which is distinctly not a person and is not sentient.

Time almost always actually picks a “person” for its Person of the Year cover, but it does sometimes get conceptual with it, at times selecting groups of people (“The Silence Breakers” of the #MeToo movement, the “Whistleblowers,” the “Good Samaritans,” “You,” and the “Ebola Fighters,” for example). In 1982 it selected “The Computer” as its “Machine of the Year,” and in 1988 it selected “The Endangered Earth” as “Planet of the Year.”

Polymarket’s users have been upset several times over the resolution of bets in the past few weeks and their concerns highlight how easy it is to manipulate the system. In November, an unauthorized edit of a live map of the Ukraine War allowed gamblers to cash in on a battle that hadn’t happened. Earlier this month, a trader made $1 million in 24 hours betting on the results of Google’s 2025 Year In Search Rankings and other users accused him of having inside knowledge of the process. Over the summer, Polymarket fought a war over whether or not President Zelenskyy had worn a suit. Surely all of this will continue to go well and be totally normal moving forward, especially as these prediction markets begin to integrate themselves with places such as CNN.




With OpenAI investment, Disney will officially begin putting AI slop into its flagship streaming product.#AIPorn #OpenAI #Disney


Disney Invests $1 Billion in the AI Slopification of Its Brand


The first thing I saw this morning when I opened X was an AI-generated trailer for Avengers: Doomsday. Robert Downey Jr’s Doctor Doom stood in a shapeless void alongside Captain America and Reed Richards. It was obvious slop but it was also close in tone and feel of the last five years of Disney’s Marvel movies. As media empires consolidate, nostalgia intensifies, and AI tools spread, Disney’s blockbusters feel more like an excuse to slam recognizable characters together in a contextless morass.

So of course Disney has announced it signed a deal with OpenAI today that will soon allow fans to make their own officially licensed Disney slop using Sora 2. The house that mouse built, and which has been notoriously protective of its intellectual property, opened up the video generator, saw the videos featuring Nazi Spongebob and criminal Pikachu, and decided: We want in.

According to a press release, the deal is a 3 year licensing agreement that will allow the AI company’s short form video platform Sora to generate slop videos using characters like Mickey Mouse and Iron Man. As part of the agreement, Disney is investing $1 billion of equity into OpenAI, said it will become a major customer of the company, and promised that fan and corporate AI-generated content would soon come to Disney+, meaning that Disney will officially begin putting AI slop into its flagship streaming product.

The deal extends to ChatGPT as well and, starting in early 2026, users will be able to crank out officially approved Disney slop on multiple platforms. When Sora 2 launched in October, it had little to no content moderation or copyright guidelines and videos of famous franchise characters doing horrible things flooded the platform. Pikachu stole diapers from a CVS, Rick and Morty pushed crypto currencies, and Disney characters shouted slurs in the aisles of Wal-Mart.

It is worth mentioning that, although Disney has traditionally been extremely protective of its intellectual property, the company’s princesses have become one of the most common fictional subjects of AI porn on the internet; 404 Media has found at least three different large subreddits dedicated to making AI porn of characters like Elsa, Snow White, Rapunzel, and Tinkerbell. In this case, Disney is fundamentally throwing its clout behind a technology that has thus far most commonly been used to make porn of its iconic characters.

After the hype of the launch, OpenAI added an “opt-in” policy to Sora that was meant to prevent users from violating the rights of copyright holders. It’s trivial to break this policy however, and circumvent the guardrails preventing a user from making a lewd Mickey Mouse cartoon or episode of The Simpsons. The original sin of Sora and other AI systems is that the training data is full of copyrighted material and the models cannot be retrained without great cost, if at all.

If you can’t beat the slop, become the slop.

“The rapid advancement of artificial intelligence marks an important moment for our industry, and through this collaboration with OpenAI we will thoughtfully and responsibly extend the reach of our storytelling through generative AI, while respecting and protecting creators and their works,” Bob Iger, CEO of Disney, said in the press release about the agreement.

The press release explained that Sora users will soon have “official” access to 200 characters in the Disney stable, including Loki, Thanos, Darth Vader, and Minnie Mouse. In exchange, Disney will begin to use OpenAI’s APIs to “build new products” and it will deploy “ChatGPT for its employees.”

I’m imagining a future where AI-generated fan trailers of famous characters standing next to each other in banal liminal spaces is the norm. People have used Sora 2 to generate some truly horrifying videos, but the guardrails have become more aggressive. As Disney enters the picture, I imagine the platform will become even more anodyne. Persistent people will slip through and generate videos of Goofy and Iron Man sucking and fucking, sure, but the vast majority of what’s coming will be safe corporate gruel that resembles a Marvel movie.




Il Portogallo paralizzato dal primo sciopero generale dopo 12 anni


@Notizie dall'Italia e dal mondo
I sindacati portoghesi hanno proclamato lo sciopero contro un piano del governo che faciliterà i licenziamenti ed estenderà la precarietà nel mondo del lavoro
L'articolohttps://pagineesteri.it/2025/12/11/europa/il-portogallo-paralizzato-dal-primo-sciopero-generale-dopo-12-anni/





Gelosia 2.0


C’è stato un tempo in cui la gelosia si misurava in sguardi di troppo, in telefonate misteriose o in ritardi sospetti. Oggi invece basta un click, o meglio, un like. La gelosia non ha più bisogno di biglietti profumati trovati in una tasca, ma di una notifica sullo schermo. Benvenuti nell’era delle gelosie 2.0, dove un cuore rosso lasciato sotto una foto può scatenare più discussioni di una cena mancata.
noblogo.org/lalchimistadigital…



Dozens of government websites have fallen victim to a PDF-based SEO scam, while others have been hijacked to sell sex toys.#AI


Porn Is Being Injected Into Government Websites Via Malicious PDFs


Dozens of government and university websites belonging to cities, towns, and public agencies across the country are hosting PDFs promoting AI porn apps, porn sites, and cryptocurrency scams; dozens more have been hit with a website redirection attacks which lead to animal vagina sex toy ecommerce pages, penis enlargement treatments, automatically-downloading Windows program files, and porn.

“Sex xxx video sexy Xvideo bf porn XXX xnxx Sex XXX porn XXX blue film Sex Video xxx sex videos Porn Hub XVideos XXX sexy bf videos blue film Videos Oficial on Instagram New Viral Video The latest original video has taken the internet by storm and left viewers in on various social media platforms ex Videos Hot Sex Video Hot Porn viral video,” reads the beginning of a three-page PDF uploaded to the website of the Irvington, New Jersey city government’s website.

The PDF, called “XnXX Video teachers fucking students Video porn Videos free XXX Hamster XnXX com” is unlike many of the other PDFs hosted on the city’s website, which include things like “2025-10-14 Council Minutes,” “Proposed Agenda 9-22-25,” and “Landlord Registration Form (1 & 2 unit dwelling).”

It is similar, however, to another PDF called “30 Best question here’s,” which looks like this:

Irvington, which is just west of Newark and has a population of 61,000 people, has fallen victim to an SEO spam attack that has afflicted local and state governments and universities around the United States.

💡
Do you know anything else about whatever is going on here? I would love to hear from you. Using a non-work device, you can message me securely on Signal at jason.404. Otherwise, send me an email at jason@404media.co.

Researcher Brian Penny has identified dozens of government and university websites that hosted PDF guides for how to make AI porn, PDFs linking to porn videos, bizarre crypto spam, sex toys, and more.

Reginfo.gov, a regulatory affairs compliance website under the federal government’s General Services Administration, is currently hosting a 12 page PDF called “Nudify AI Free, No Sign-Up Needed!,” which is an ad and link to an abusive AI app designed to remove a person’s clothes. The Kansas Attorney General’s office and the Mojave Desert Air Quality Management District Office in California hosted PDFs called “DeepNude AI Best Deepnude AI APP 2025.” Penny found similar PDFs on the websites for the Washington Department of Fish and Wildlife, the Washington Fire Commissioners Association, the Florida Department of Agriculture, the cities of Jackson, Mississippi and Massillon, Ohio, various universities throughout the country, and dozens of others. Penny has caught the attention of local news throughout the United States, who have reported on the problem.

The issue appears to be stemming from websites that allow people to upload their own PDFs, which then sit on these government websites. Because they are loaded with keywords for widely searched terms and exist on government and university sites with high search authority, Google and other search engines begin to surface them. In the last week or so, many (but not all) of the PDFs Penny has discovered have been deleted by local governments and universities.

But cities seem like they are having more trouble cleaning up another attack, which is redirecting traffic from government URLs to porn, e-commerce, and spam sites. In an attack that seems similar to what we reported in June, various government websites are somehow being used to maliciously send traffic elsewhere. For example, the New York State Museum’s online exhibit for something called “The Family Room” now has at least 11 links to different types of “realistic” animal vagina pocket masturbators, which include “Zebra Animal Vagina Pussy Male Masturbation Cup — Pocket Realistic Silicone Penis Sex Toy ($27.99),” and “Must-have Horse Pussy Torso Buttocks Male Masturbator — Fantasy Realistic Animal Pussie Sex Doll.”

Links Penny found on Knoxville, Tennessee’s site for permitting inspections first go to a page that looks like a government site for hosting files then redirects to a page selling penis growth supplements that features erect penises (human penises, mercifully), blowjobs, men masturbating, and Dr. Oz’s face.

Another Knoxville link I found, which purports to be a pirated version of the 2002 Vin Diesel film XXX simply downloaded a .exe file to my computer.

Penny believes that what he has found is basically the tip of the iceberg, because he is largely finding these by typing things like “nudify site:.gov” “xxx site:.gov” into Google and clicking around. Sometimes, malicious pages surface only on image searches or video searches: “Basically the craziest things you can think of will show up as long as you’re on image search,” Penny told 404 Media. “I’ll be doing this all week.”

The Nevada Department of Transportation told 404 Media that “This incident was not related to NDOT infrastructure or information systems, and the material was not hosted on NDOT servers.This unfortunate incident was a result of malicious use of a legitimate form created using the third-party platform on which NDOT’s website is hosted. NDOT expeditiously worked with our web hosting vendor to ensure the inappropriate content was removed.” It added that the third-party is Granicus, a massive government services company that provides website backend infrastructure for many cities and states around the country, as well as helps them stream and archive city council meetings, among other services. Several of the affected local governments use Granicus, but not all of them do; Granicus did not respond to two requests for comment from 404 Media.

The California Secretary of State’s Office told 404 Media: “A bad actor uploaded non-business documents to the bizfile Online system (a portal for business filings and information). The files were then used in external links allowing public access to only those uploaded files. No data was compromised. SOS staff took immediate action to remove the ability to use the system for non-SOS business purposes and are removing the unauthorized files from the system.” The Washington Department of Fish and Wildlife said “WDFW is aware of this issue and is actively working with our partners at WaTech to address it.” The other government agencies mentioned in this article did not respond to our requests for comment.


#ai


The discovery of fire-cracked handaxes and sparking tools in southern Britain pushes the timeline of controlled fires back 350,000 years.#TheAbstract


Scientists Discover the Earliest Human-Made Fire, Rewriting Evolutionary History


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Humans made fires as early as 400,000 years ago, pushing the timeline of this crucial human innovation back a staggering 350,000 years, reports a study published on Wednesday in Nature.

Mastery of fire is one of the most significant milestones in our evolutionary history, enabling early humans to cook nutritious food, seek protection from predators, and establish comfortable spaces for social gatherings. The ability to make fires is completely unique to the Homo genus that includes modern humans (Homo sapiens) and extinct humans, including Neanderthals.

Early humans may have opportunistically exploited wildfires more than one million years ago, but the oldest known controlled fires, which were intentionally lit with specialized tools, were previously dated back to about 50,000 years ago at Neanderthal sites in France.

Now, archaeologists have unearthed the remains of campfires ignited by an unidentified group of humans 400,000 years ago at Barnham, a village near the southern coast of the United Kingdom.

“This is a 400,000-year-old site where we have the earliest evidence of making fire—not just in Britain or Europe, but in fact, anywhere else in the world,” said Nick Ashton, an archaeologist at the British Museum who co-authored the study, in a press briefing held on Tuesday.

“Many of the great turning points in human development, and the development of our civilization, depended on fire,” added co-author Rob Davis, also an archaeologist at the British Museum. “We're a species who have used fire to really shape the world around us—in belief systems, as well. It's a very prominent part of belief systems across the world.”

Artifacts have been recovered from Barnham for more than a century, but the remnants of this ancient hearth were identified within the past decade. The researchers were initially tipped off by the remains of heated clay sediments, hydrocarbons associated with fire, and fire-cracked flint handaxes.

But the real smoking gun was the discovery of two small fragments of iron pyrite, a mineral commonly used to strike flint to produce sparks at later prehistoric campfires such as the French Neanderthal sites.
Discovery of the first fragment of iron pyrite in 2017 at Barnham, Suffolk Image: Jordan Mansfield, Pathways to Ancient Britain Project.
“Iron pyrite is a naturally occurring mineral, but through geological work in the area over the last 36 years, looking at 26 sites, we argue that pyrite is incredibly rare in the area,” said Ashton. “We think humans brought pyrite to the site with the intention of making fire.”

The fire-starters were probably Neanderthals, who were known to be present in the region at the time thanks to a skull found in Swanscombe, about 80 miles northeast of Barnham. But it’s possible that the fires were made by another human lineage such as Homo heidelbergensis, which also left bones in the U.K. around the same period. It was not Homo sapiens as our lineage emerged in Africa later, about 300,000 years ago.

Regardless of this group’s identity, its ability to make fire would have been a major advantage, especially in the relatively cold environment of southern Britain at the time. It also hints that the ability to make fire extends far deeper into the past than previously known.

“We assume that the people who made the fire at Barnham brought the knowledge with them from continental Europe,” said co-author Chris Stringer, a physical anthropologist at the Natural History Museum. “There was a land bridge there. There had been a major cold stage about 450,000 years ago, which had probably wiped out everyone in Britain. Britain had to be repopulated all over again.”

“Having that use of fire, which they must have brought with them when they came into Britain, would have helped them colonize this new area and move a bit further north to places where the winters are going to be colder,” he continued. “You can keep warm. You can keep wild animals away. You get more nutrition from your food.”
Excavation of the ancient campfire, removing diagonally opposed quadrants. The reddened sediment between band B’ is heated clay. Image: Jordan Mansfield, Pathways to Ancient Britain Project.
Although these humans likely had brains close in size to our own, the innovation of controlled fire would have amplified their cognitive development, social bonds, and symbolic capacities. In the flickering light of ancient campfires, these humans shared food, protection, and company, passing on a tradition that fundamentally reshaped our evolutionary trajectory.

“People were sitting around the fires, sharing information, having extra time beyond pure daylight to make things, to teach things, to communicate with each other, to tell stories,” Stringer said. “Maybe it may have even fueled the development of language.”

“We've got this crucial aspect in human evolution, and we can put a marker down that it was there 400,000 years ago,” he concluded.